Research Article

Cybersecurity Vulnerability Analysis of the PLC PRIME Standard

Figure 17

Traffic traces during a node registration spoofing attack.